We started looking into deploying: metallb v0.13.6.
It has permissions to edit all crds on the cluster as well as all validating/mutating webhooks on the cluster.
This is a lot of permissions on a long running service that could really damage the cluster badly.
It should be possible to use a resourceNames section (https://kubernetes.io/docs/reference/access-authn-authz/rbac/#referring-to-resources) on the roles to restrict the access just to the things the controller actually needs to edit.